You can look in your network settings and see if you are being sent through a proxy.
Many schools and businesses use a proxy server for Internet access or have their routing equipment configured for restricted access.
This allows them to limit access to the Internet entirely or filter certain sites and types of content that they don't want students, employees or visitors to access.
Even if they don't use a proxy they most certainly use a router.
A router log doesn't capture and record everything that was done on a particular computer, however it can tell exactly which URL's (Web Sites) were visited and when. Also any files downloaded by a specific device will be logged.
Here's how it works:
When a device connects to the Internet via a router either by WiFi or Ethernet the device's MAC address is stored.
Every device that has a network interface has a unique MAC (Media Access Control) address. This is usually expressed in hexadecimal such as 10:25:A4:59:EF:1C
The router then assigns the device a unique IP address via its DHCP service. They are in binary but usually expressed in readable format such as 192.168.1.25
Now you know the technical aspects of how a specific device is identifiable, I will proceed.
Every time a specific device tries to go to a web page or download a file, its Internet browser requests that content from a remote web server be delivered to the device via HTTP or HTTPS.
All of the web content including the source code, formatting (CSS), graphics, flash content, etc. must be requested via the router's connection to the Internet service provider's routing equipment.
The Internet provider is required by law to keep a detailed log of the sites that are visited and files that are downloaded for a period of time that varies by provider and state. This router log file will be released to law enforcement with a proper subpena.
NOTE: The Internet provider does not know which device requested the data. The router appears as one device to the ISP, However the router does know which specific device requested what data.
The router keeps detailed logs, If the network administrator is tech savvy, they can easily see exactly what sites have been visited and what files were downloaded by a specific device by simply examining their wireless router log. This is not technically the same as your browser URL history file, however by examining the URL's requested by your device the history of sites that you visited can be easily reconstructed.
The router logs have a specific size limit, and when this limit is reached older data is overwritten. On my Netgear router I have it configured to email the logs to a Gmail account when they are full and clear them. This gives me a complete record of of all router activity that I can examine for any specific date.
The most common way of hiding a WAN IP address is to use a web based proxy server. Your HTTP requests are sent to the proxy server. The proxy server forwards your request to the destination server, and then fetches the requested content and relays it back to you.
Proxy servers have risks, especially free ones where you don't know where your data goes or who has access to it. http://whatismyipaddress.com/proxy-risks
There is no way to really hide your WAN or public IP entirely, otherwise no data could be sent to your computer from the Internet as it would not know the destination address.
Best way is to not use the employer's Internet connection. I use mobile broadband from Verizon using a wireless mobile hotspot app on my smartphone when I'm away from my high speed cable Internet at home. If you run a business or need Internet access anywhere, this is a good option.
Internet Service Info. - http://isp1.us
· 6 years ago